notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

Port details
wolfssl Embedded SSL C-Library
5.7.0 security on this many watch lists=0 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 5.7.0Version of this port present on the latest quarterly branch.
Maintainer: fox@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2015-03-28 09:15:32
Last Update: 2024-03-24 13:03:36
Commit Hash: 237d98d
Also Listed In: devel
License: GPLv2+
WWW:
https://www.wolfssl.com/
Description:
WolfSSL is an embedded SSL Library for programmers building security functionality into their applications and devices. Highlights - Up to TLS 1.3 and DTLS 1.3 - Full client and server support - Progressive list of supported ciphers - Key and Certificate generation - OCSP, CRL support Lightweight - Small Size: 20-100kB - Runtime Memory: 1-36kB - 20x smaller than OpenSSL Portable - Abstraction Layers (OS, Custom I/O, Standard C library, and more) - Simple API - OpenSSL Compatibility Layer - Long list of supported platforms
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (181 items)
Collapse this list.
  1. @ldconfig
  2. /usr/local/share/licenses/wolfssl-5.7.0/catalog.mk
  3. /usr/local/share/licenses/wolfssl-5.7.0/LICENSE
  4. /usr/local/share/licenses/wolfssl-5.7.0/GPLv2+
  5. bin/wolfssl-config
  6. include/wolfssl/callbacks.h
  7. include/wolfssl/certs_test.h
  8. include/wolfssl/crl.h
  9. include/wolfssl/error-ssl.h
  10. include/wolfssl/ocsp.h
  11. include/wolfssl/openssl/aes.h
  12. include/wolfssl/openssl/asn1.h
  13. include/wolfssl/openssl/asn1t.h
  14. include/wolfssl/openssl/bio.h
  15. include/wolfssl/openssl/bn.h
  16. include/wolfssl/openssl/buffer.h
  17. include/wolfssl/openssl/camellia.h
  18. include/wolfssl/openssl/cmac.h
  19. include/wolfssl/openssl/cms.h
  20. include/wolfssl/openssl/compat_types.h
  21. include/wolfssl/openssl/conf.h
  22. include/wolfssl/openssl/crypto.h
  23. include/wolfssl/openssl/des.h
  24. include/wolfssl/openssl/dh.h
  25. include/wolfssl/openssl/dsa.h
  26. include/wolfssl/openssl/ec.h
  27. include/wolfssl/openssl/ec25519.h
  28. include/wolfssl/openssl/ec448.h
  29. include/wolfssl/openssl/ecdh.h
  30. include/wolfssl/openssl/ecdsa.h
  31. include/wolfssl/openssl/ed25519.h
  32. include/wolfssl/openssl/ed448.h
  33. include/wolfssl/openssl/engine.h
  34. include/wolfssl/openssl/err.h
  35. include/wolfssl/openssl/evp.h
  36. include/wolfssl/openssl/fips_rand.h
  37. include/wolfssl/openssl/hmac.h
  38. include/wolfssl/openssl/kdf.h
  39. include/wolfssl/openssl/lhash.h
  40. include/wolfssl/openssl/md4.h
  41. include/wolfssl/openssl/md5.h
  42. include/wolfssl/openssl/modes.h
  43. include/wolfssl/openssl/obj_mac.h
  44. include/wolfssl/openssl/objects.h
  45. include/wolfssl/openssl/ocsp.h
  46. include/wolfssl/openssl/opensslconf.h
  47. include/wolfssl/openssl/opensslv.h
  48. include/wolfssl/openssl/ossl_typ.h
  49. include/wolfssl/openssl/pem.h
  50. include/wolfssl/openssl/pkcs12.h
  51. include/wolfssl/openssl/pkcs7.h
  52. include/wolfssl/openssl/rand.h
  53. include/wolfssl/openssl/rc4.h
  54. include/wolfssl/openssl/ripemd.h
  55. include/wolfssl/openssl/rsa.h
  56. include/wolfssl/openssl/sha.h
  57. include/wolfssl/openssl/sha3.h
  58. include/wolfssl/openssl/srp.h
  59. include/wolfssl/openssl/ssl.h
  60. include/wolfssl/openssl/ssl23.h
  61. include/wolfssl/openssl/stack.h
  62. include/wolfssl/openssl/tls1.h
  63. include/wolfssl/openssl/txt_db.h
  64. include/wolfssl/openssl/ui.h
  65. include/wolfssl/openssl/x509.h
  66. include/wolfssl/openssl/x509_vfy.h
  67. include/wolfssl/openssl/x509v3.h
  68. include/wolfssl/options.h
  69. include/wolfssl/quic.h
  70. include/wolfssl/sniffer.h
  71. include/wolfssl/sniffer_error.h
  72. include/wolfssl/ssl.h
  73. include/wolfssl/test.h
  74. include/wolfssl/version.h
  75. include/wolfssl/wolfcrypt/aes.h
  76. include/wolfssl/wolfcrypt/arc4.h
  77. include/wolfssl/wolfcrypt/asn.h
  78. include/wolfssl/wolfcrypt/asn_public.h
  79. include/wolfssl/wolfcrypt/blake2-impl.h
  80. include/wolfssl/wolfcrypt/blake2-int.h
  81. include/wolfssl/wolfcrypt/blake2.h
  82. include/wolfssl/wolfcrypt/camellia.h
  83. include/wolfssl/wolfcrypt/chacha.h
  84. include/wolfssl/wolfcrypt/chacha20_poly1305.h
  85. include/wolfssl/wolfcrypt/cmac.h
  86. include/wolfssl/wolfcrypt/coding.h
  87. include/wolfssl/wolfcrypt/compress.h
  88. include/wolfssl/wolfcrypt/cpuid.h
  89. include/wolfssl/wolfcrypt/cryptocb.h
  90. include/wolfssl/wolfcrypt/curve25519.h
  91. include/wolfssl/wolfcrypt/curve448.h
  92. include/wolfssl/wolfcrypt/des3.h
  93. include/wolfssl/wolfcrypt/dh.h
  94. include/wolfssl/wolfcrypt/dilithium.h
  95. include/wolfssl/wolfcrypt/dsa.h
  96. include/wolfssl/wolfcrypt/ecc.h
  97. include/wolfssl/wolfcrypt/eccsi.h
  98. include/wolfssl/wolfcrypt/ed25519.h
  99. include/wolfssl/wolfcrypt/ed448.h
  100. include/wolfssl/wolfcrypt/error-crypt.h
  101. include/wolfssl/wolfcrypt/ext_kyber.h
  102. include/wolfssl/wolfcrypt/ext_lms.h
  103. include/wolfssl/wolfcrypt/ext_xmss.h
  104. include/wolfssl/wolfcrypt/falcon.h
  105. include/wolfssl/wolfcrypt/fe_448.h
  106. include/wolfssl/wolfcrypt/fe_operations.h
  107. include/wolfssl/wolfcrypt/fips_test.h
  108. include/wolfssl/wolfcrypt/ge_448.h
  109. include/wolfssl/wolfcrypt/ge_operations.h
  110. include/wolfssl/wolfcrypt/hash.h
  111. include/wolfssl/wolfcrypt/hmac.h
  112. include/wolfssl/wolfcrypt/hpke.h
  113. include/wolfssl/wolfcrypt/integer.h
  114. include/wolfssl/wolfcrypt/kdf.h
  115. include/wolfssl/wolfcrypt/kyber.h
  116. include/wolfssl/wolfcrypt/lms.h
  117. include/wolfssl/wolfcrypt/logging.h
  118. include/wolfssl/wolfcrypt/md2.h
  119. include/wolfssl/wolfcrypt/md4.h
  120. include/wolfssl/wolfcrypt/md5.h
  121. include/wolfssl/wolfcrypt/mem_track.h
  122. include/wolfssl/wolfcrypt/memory.h
  123. include/wolfssl/wolfcrypt/misc.h
  124. include/wolfssl/wolfcrypt/mpi_class.h
  125. include/wolfssl/wolfcrypt/mpi_superclass.h
  126. include/wolfssl/wolfcrypt/pkcs12.h
  127. include/wolfssl/wolfcrypt/pkcs7.h
  128. include/wolfssl/wolfcrypt/poly1305.h
  129. include/wolfssl/wolfcrypt/pwdbased.h
  130. include/wolfssl/wolfcrypt/random.h
  131. include/wolfssl/wolfcrypt/rc2.h
  132. include/wolfssl/wolfcrypt/ripemd.h
  133. include/wolfssl/wolfcrypt/rsa.h
  134. include/wolfssl/wolfcrypt/sakke.h
  135. include/wolfssl/wolfcrypt/settings.h
  136. include/wolfssl/wolfcrypt/sha.h
  137. include/wolfssl/wolfcrypt/sha256.h
  138. include/wolfssl/wolfcrypt/sha3.h
  139. include/wolfssl/wolfcrypt/sha512.h
  140. include/wolfssl/wolfcrypt/signature.h
  141. include/wolfssl/wolfcrypt/siphash.h
  142. include/wolfssl/wolfcrypt/sm2.h
  143. include/wolfssl/wolfcrypt/sm3.h
  144. include/wolfssl/wolfcrypt/sm4.h
  145. include/wolfssl/wolfcrypt/sp_int.h
  146. include/wolfssl/wolfcrypt/sphincs.h
  147. include/wolfssl/wolfcrypt/srp.h
  148. include/wolfssl/wolfcrypt/tfm.h
  149. include/wolfssl/wolfcrypt/types.h
  150. include/wolfssl/wolfcrypt/visibility.h
  151. include/wolfssl/wolfcrypt/wc_encrypt.h
  152. include/wolfssl/wolfcrypt/wc_kyber.h
  153. include/wolfssl/wolfcrypt/wc_lms.h
  154. include/wolfssl/wolfcrypt/wc_port.h
  155. include/wolfssl/wolfcrypt/wc_xmss.h
  156. include/wolfssl/wolfcrypt/wolfevent.h
  157. include/wolfssl/wolfcrypt/wolfmath.h
  158. include/wolfssl/wolfcrypt/xmss.h
  159. include/wolfssl/wolfio.h
  160. lib/libwolfssl.a
  161. lib/libwolfssl.so
  162. lib/libwolfssl.so.42
  163. lib/libwolfssl.so.42.1.0
  164. libdata/pkgconfig/wolfssl.pc
  165. share/doc/wolfssl/QUIC.md
  166. share/doc/wolfssl/README.txt
  167. share/doc/wolfssl/example/async_client.c
  168. share/doc/wolfssl/example/async_server.c
  169. share/doc/wolfssl/example/client.c
  170. share/doc/wolfssl/example/echoclient.c
  171. share/doc/wolfssl/example/echoserver.c
  172. share/doc/wolfssl/example/sctp-client-dtls.c
  173. share/doc/wolfssl/example/sctp-client.c
  174. share/doc/wolfssl/example/sctp-server-dtls.c
  175. share/doc/wolfssl/example/sctp-server.c
  176. share/doc/wolfssl/example/server.c
  177. share/doc/wolfssl/example/tls_bench.c
  178. share/doc/wolfssl/taoCert.txt
  179. @owner
  180. @group
  181. @mode
Collapse this list.
Dependency lines:
  • wolfssl>0:security/wolfssl
To install the port:
cd /usr/ports/security/wolfssl/ && make install clean
To add the package, run one of these commands:
  • pkg install security/wolfssl
  • pkg install wolfssl
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: wolfssl
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1711187466 SHA256 (wolfssl-5.7.0.zip) = 30bea4b6537157c4720435343b380c5eca9185218738265ca6e090828e7c9c06 SIZE (wolfssl-5.7.0.zip) = 24483650

Packages (timestamps in pop-ups are UTC):
wolfssl
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest5.7.05.7.04.6.05.7.05.7.0-4.6.0-
FreeBSD:13:quarterly5.7.05.7.05.6.05.7.05.7.05.6.65.6.65.6.6
FreeBSD:14:latest5.7.05.7.05.5.35.7.05.7.05.6.0-5.6.0
FreeBSD:14:quarterly5.7.05.7.0-5.7.05.7.05.6.65.6.65.6.6
FreeBSD:15:latest5.7.05.7.0n/a5.7.0n/a5.6.65.6.65.6.6
This port has no dependencies.
This port is required by:
for Libraries
  1. security/wolfssh

Configuration Options:
===> The following configuration options are available for wolfssl-5.7.0: DEBUG=off: Build with debugging support DOCS=on: Build and/or install documentation ===> Use 'make config' to modify these settings
Options name:
security_wolfssl
USES:
cpe libtool zip
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (5 items)
Collapse this list.
  1. http://distcache.FreeBSD.org/local-distfiles/fox/
  2. http://distcache.eu.FreeBSD.org/local-distfiles/fox/
  3. http://distcache.us-east.FreeBSD.org/local-distfiles/fox/
  4. http://distcache.us-west.FreeBSD.org/local-distfiles/fox/
  5. https://www.wolfssl.com/
Collapse this list.

Number of commits found: 51

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
5.7.0
24 Mar 2024 13:03:36
commit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3ecommit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3ecommit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3ecommit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3e files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to 5.7.0

Changes since 5.6.6:

wolfSSL Release 5.7.0 (Mar 20, 2024)

NOTE: * --enable-heapmath is being deprecated and will be removed by end of
2024

NOTE: In future releases, --enable-des3 (which is disabled by default) will
be insufficient in itself to enable DES3 in TLS cipher suites. A new option,
--enable-des3-tls-suites, will need to be supplied in addition. This option
should only be used in backward compatibility scenarios, as it is inherently
insecure.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.6.6
25 Dec 2023 23:01:02
commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507 files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to 5.6.6

Changes since 5.6.4:

wolfSSL Release 5.6.6 (Dec 19, 2023)

NOTE: * --enable-heapmath is being deprecated and will be removed by 2024

REMINDER: When working with AES Block Cipher algorithms, wc_AesInit() should
always be called first to initialize the Aes structure, before calling other Aes
API functions. Recently we found several places in our documentation, comments,
and codebase where this pattern was not observed. We have since fixed this
omission in several PRs for this release.

Vulnerabilities
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.6.4
19 Nov 2023 10:36:45
commit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22fcommit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22fcommit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22fcommit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22f files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.6.4

Changes since v5.6.3:

wolfSSL Release 5.6.4 (October 30, 2023)

NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Old CyaSSL/CtaoCrypt shim layer was removed in this release (5.6.4)

Vulnerabilities

  * [Medium] A fix was added, but still under review for completeness, for a
    Bleichenbacher style attack, leading to being able to decrypt a saved TLS
    connection and potentially forge a signature after probing with a large
    number of trial connections. This issue is around RSA decryption and
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.6.3
02 Jul 2023 18:48:43
commit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75ccommit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75ccommit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75ccommit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75c files touched by this commit
Dima Panov (fluffy) search for other commits by this committer
security/wolfssl: fix packageing (+)

Unbreak packaging after 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c

===> Checking for items in STAGEDIR missing from pkg-plist
Error: Orphaned: lib/libwolfssl.so.35.5.1
===> Checking for items in pkg-plist which are not in STAGEDIR
Error: Missing: lib/libwolfssl.so.35.4.0
===> Error: Plist issues found.

Reported by:	poudriere fallout
Approved by:	portmgr blanket
5.6.3
01 Jul 2023 17:07:46
commit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8ccommit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8ccommit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8ccommit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.6.3

Changes since v5.6.0:

wolfSSL Release 5.6.3 (Jun 16, 2023)

Release 5.6.3 of wolfSSL embedded TLS has 4 bug fixes:

* Fix for setting the atomic macro options introduced in release 5.6.2. This
  issue affects GNU gcc autoconf builds. The fix resolves a potential mismatch
of
  the generated macros defined in options.h file and the macros used when the
  wolfSSL library is compiled. In version 5.6.2 this mismatch could result in
  unstable runtime behavior.
* Fix for invalid suffix error with Windows build using the macro
  GCM_TABLE_4BIT.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.6.0
26 Mar 2023 09:14:13
commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004 files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.6.0

Changes since v5.5.4:

wolfSSL Release 5.6.0 (Mar 24, 2023)

Release 5.6.0 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality
criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance

NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * This
release makes ASN Template the default with ./configure, the previous ASN
parsing can be built with --enable-asn=original

Release 5.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.5.4
04 Feb 2023 15:44:24
commit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9ccommit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9ccommit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9ccommit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9c files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.5.4

Changes since v5.5.3:

wolfSSL Release 5.5.4 (Dec 21, 2022)

Release 5.5.4 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

* QUIC related changes for HAProxy integration and config option
* Support for Analog Devices MAXQ1080 and MAXQ1065
* Testing and build of wolfSSL with NuttX
* New software based entropy gatherer with configure option
  --enable-entropy-memuseOP
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.5.3
26 Nov 2022 21:08:47
commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254 files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update the description.

Update the supported TLS version in description.

PR: 267737
Reported by: Yonas Yanfa <yonas.yanfa@gmail.com>
5.5.3
12 Nov 2022 05:55:40
commit hash: e711537e2dc64236725736aceb40d72a4b6bc128commit hash: e711537e2dc64236725736aceb40d72a4b6bc128commit hash: e711537e2dc64236725736aceb40d72a4b6bc128commit hash: e711537e2dc64236725736aceb40d72a4b6bc128 files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.5.3

Changes since v5.5.1:

wolfSSL Release 5.5.3 (Nov 2, 2022)

Release 5.5.3 of wolfSSL embedded TLS has the following bug fix:

Fixes

* Fix for possible buffer zeroization overrun introduced at the end of v5.5.2
  release cycle in GitHub pull request 5743
  (https://github.com/wolfSSL/wolfssl/pull/5743) and fixed in pull request 5757
  (https://github.com/wolfSSL/wolfssl/pull/5757). In the case where a specific
  memory allocation failed or a hardware fault happened there was the potential
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.5.1
01 Oct 2022 11:55:13
commit hash: 44b4edac350261df25ca4153ed01148a94051d90commit hash: 44b4edac350261df25ca4153ed01148a94051d90commit hash: 44b4edac350261df25ca4153ed01148a94051d90commit hash: 44b4edac350261df25ca4153ed01148a94051d90 files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.5.1

Changes since v5.5.0:

wolfSSL Release 5.5.1 (Sep 28, 2022) Latest

Vulnerabilities
* [Med] Denial of service attack and buffer overflow against TLS 1.3 servers
  using session ticket resumption. When built with --enable-session-ticket and
  making use of TLS 1.3 server code in wolfSSL, there is the possibility of a
  malicious client to craft a malformed second ClientHello packet that causes
  the server to crash. This issue is limited to when using both
  --enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3
  servers, and having --enable-session-ticket, should update to the latest
  version of wolfSSL. Thanks to Max at Trail of Bits for the report and
(Only the first 15 lines of the commit message are shown above View all of this commit message)
07 Sep 2022 21:58:51
commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 files touched by this commit
Stefan Eßer (se) search for other commits by this committer
Remove WWW entries moved into port Makefiles

Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.

This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.

Approved by:		portmgr (tcberner)
5.5.0
07 Sep 2022 21:10:59
commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 files touched by this commit
Stefan Eßer (se) search for other commits by this committer
Add WWW entries to port Makefiles

It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.5.0
04 Sep 2022 08:43:24
commit hash: d915d5a4791539b1acb556c67489cacae3aae0afcommit hash: d915d5a4791539b1acb556c67489cacae3aae0afcommit hash: d915d5a4791539b1acb556c67489cacae3aae0afcommit hash: d915d5a4791539b1acb556c67489cacae3aae0af files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.5.0

Changes since v5.4.0:

wolfSSL Release 5.5.0 (Aug 30, 2022)

Note:
** If not free’ing FP_ECC caches per thread by calling wc_ecc_fp_free there is
a
   possible memory leak during TLS 1.3 handshakes which use ECC. Users are urged
   to confirm they are free’ing FP_ECC caches per thread if enabled to avoid
   this issue.

Release 5.5.0 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.4.0
08 Aug 2022 08:07:52
commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18 files touched by this commit
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.4.0

Changes since v5.3.0:

wolfSSL Release 5.4.0 (July 11, 2022)

Note:
** Future releases of wolfSSL will turn off TLS 1.1 by default
** Release 5.4.0 made SP math the default math implementation. To make an
   equivalent build as –disable-fastmath from previous versions of wolfSSL,
now
   requires using the configure option –enable-heapmath instead.

Release 5.4.0 of wolfSSL embedded TLS has bug fixes and new features including:

Vulnerabilities
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.3.0
07 May 2022 11:43:03
commit hash: 9819baefd0e561dd26087196faf9e477115f57b5commit hash: 9819baefd0e561dd26087196faf9e477115f57b5commit hash: 9819baefd0e561dd26087196faf9e477115f57b5commit hash: 9819baefd0e561dd26087196faf9e477115f57b5 files touched by this commit This port version is marked as vulnerable.
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.3.0

Changes since v5.2.0:

Release 5.3.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions
Ports

  * Updated support for Stunnel to version 5.61
  * Add i.MX8 NXP SECO use for secure private ECC keys and expand
    cryptodev-linux for use with the RSA/Curve25519 with the Linux CAAM driver
  * Allow encrypt then mac with Apache port
  * Update Renesas TSIP version to 1.15 on GR-ROSE and certificate signature
    data for TSIP / SCE example
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.2.0
26 Feb 2022 06:58:42
commit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fbcommit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fbcommit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fbcommit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb files touched by this commit This port version is marked as vulnerable.
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.2.0

Changes since v5.1.1:

wolfSSL Release 5.2.0 (Feb 21, 2022)

Release 5.2.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [High] A TLS v1.3 server who requires mutual authentication can be
    bypassed. If a malicious client does not send the certificate_verify message
    a client can connect without presenting a certificate even if the server
    requires one. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
    Télécom SudParis.
  * [High] A TLS v1.3 client attempting to authenticate a TLS v1.3 server can
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.1.1
08 Jan 2022 09:57:16
commit hash: 91258b1619a5516664f1c36d5440d73af6696316commit hash: 91258b1619a5516664f1c36d5440d73af6696316commit hash: 91258b1619a5516664f1c36d5440d73af6696316commit hash: 91258b1619a5516664f1c36d5440d73af6696316 files touched by this commit This port version is marked as vulnerable.
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.1.1

Changes since v5.1.0:

wolfSSL Release 5.1.1 (Jan 3rd, 2022)

Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:
Vulnerabilities

  * [High] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV
    being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing
    TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the
    version of wolfSSL used.
5.1.0
30 Dec 2021 01:26:14
commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89 files touched by this commit This port version is marked as vulnerable.
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.1.0

Changes since v5.0.0:

wolfSSL Release 5.1.0 (Dec 27, 2021)

Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [Low] Potential for DoS attack on a wolfSSL client due to processing hello
    packets of the incorrect side. This affects only connections using TLS v1.2
    or less that have also been compromised by a man in the middle
    attack. Thanks to James Henderson, Mathy Vanhoef, Chris M. Stone, Sam
    L. Thomas, Nicolas Bailleut, and Tom Chothia (University of Birmingham, KU
    Leuven, ENS Rennes for the report.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
5.0.0
06 Nov 2021 04:57:38
commit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0dcommit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0dcommit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0dcommit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0d files touched by this commit This port version is marked as vulnerable.
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Update to v5.0.0

Changes since v4.8.1:

wolfSSL Release 5.0.0 (Nov 01, 2021)

Release 5.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [\Low] Hang with DSA signature creation when a specific q value is used in a
    maliciously crafted key. If a DSA key with an invalid q value of either 1 or
    0 was decoded and used for creating a signature, it would result in a hang
    in wolfSSL. Users that are creating signatures with DSA and are using keys
    supplied from an outside source are affected.
  * [\Low] Issue with incorrectly validating a certificate that has multiple
(Only the first 15 lines of the commit message are shown above View all of this commit message)
4.8.1
10 Sep 2021 21:18:26
commit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cbcommit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cbcommit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cbcommit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cb files touched by this commit This port version is marked as vulnerable.
Bernhard Froehlich (decke) search for other commits by this committer
security/wolfssl: Add CPE information

Approved by:	portmgr (blanket)
4.8.1
24 Jul 2021 04:49:39
commit hash: e4b770114494f3d54409aef6bd23a3a2def34399commit hash: e4b770114494f3d54409aef6bd23a3a2def34399commit hash: e4b770114494f3d54409aef6bd23a3a2def34399commit hash: e4b770114494f3d54409aef6bd23a3a2def34399 files touched by this commit This port version is marked as vulnerable.
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Updates to v4.8.1

Changes since v4.8.0:

wolfSSL Release 4.8.1 (July 16, 2021)

Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix:
Vulnerabilities

  * [High] OCSP verification issue when response is for a certificate with no
    relation to the chain in question BUT that response contains the NoCheck
    extension which effectively disables ALL verification of that one cert.
    Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS
    server users doing mutual auth with OCSP, and CertManager users doing OCSP
    independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum
    and Alissa Kim of Volkswagen Infotainment for the report.
4.8.0
15 Jul 2021 04:40:40
commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3 files touched by this commit This port version is marked as vulnerable.
Santhosh Raju (fox) search for other commits by this committer
security/wolfssl: Updates to v4.8.0

Changes since v4.7.0:

wolfSSL Release 4.8.0 (July 09, 2021)

Release 4.8.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [Low] OCSP request/response verification issue. In the case that the serial
    number in the OCSP request differs from the serial number in the OCSP
    response the error from the comparison was not resulting in a failed
    verification. We recommend users that have wolfSSL version 4.6.0 and 4.7.0
    with OCSP enabled update their version of wolfSSL. Version 4.5.0 and earlier
    are not affected by this report. Thanks to Rainer, Roee, Barak, Hila and
(Only the first 15 lines of the commit message are shown above View all of this commit message)
4.7.0
07 Apr 2021 08:09:01
commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
One more small cleanup, forgotten yesterday.
Reported by:	lwhsu
4.7.0
06 Apr 2021 14:31:07
commit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344eb files touched by this commit This port version is marked as vulnerable.
Mathieu Arnold (mat) search for other commits by this committer
Remove # $FreeBSD$ from Makefiles.
4.7.0
08 Mar 2021 04:10:54
Revision:567824Original commit files touched by this commit This port version is marked as vulnerable.
fox search for other commits by this committer
security/wolfssl: Updates to v4.7.0

- Remove the memory leak patch since now it is upstreamed.

Changes since v4.6.0:

wolfSSL Release 4.7.0 (February 16, 2021)

Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions

  * Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API,
    X509_STORE_CTX API added
  * WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
  * Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session
(Only the first 15 lines of the commit message are shown above View all of this commit message)
4.6.0_1
24 Feb 2021 15:43:35
Revision:566484Original commit files touched by this commit This port version is marked as vulnerable.
tobik search for other commits by this committer
security/wolfssl: Fix QA issues

====> Checking for pkg-plist issues (check-plist)
===> Parsing plist
===> Checking for items in STAGEDIR missing from pkg-plist
===> Checking for items in pkg-plist which are not in STAGEDIR
Error: Missing: %%DOCSDIR%%/README.txt
Error: Missing: %%DOCSDIR%%/example/client.c
Error: Missing: %%DOCSDIR%%/example/echoclient.c
Error: Missing: %%DOCSDIR%%/example/echoserver.c
Error: Missing: %%DOCSDIR%%/example/sctp-client-dtls.c
Error: Missing: %%DOCSDIR%%/example/sctp-client.c
Error: Missing: %%DOCSDIR%%/example/sctp-server-dtls.c
Error: Missing: %%DOCSDIR%%/example/sctp-server.c
Error: Missing: %%DOCSDIR%%/example/server.c
(Only the first 15 lines of the commit message are shown above View all of this commit message)
4.6.0_1
29 Jan 2021 22:11:11
Revision:563255Original commit files touched by this commit This port version is marked as vulnerable.
fox search for other commits by this committer
security/wolfssl: Add DEBUG option and enable more features.

- Set --enable-opensslall which is needed for
  wolfSSL_X509_NAME_print_ex() and friends.
- Set --enable-certgen to allow certificate generation.
- Define WOLFSSL_ALT_NAMES so one can generate certificates
  with the Subject Alternative Name extension.
- Set --enable-sessioncerts to allow to inspect certificates
  with wolfSSL_get_peer_cert_chain().
- Set --enable-des3 so one can load PBES2-3DES-CBC-encoded keys.

Additionally a patch to prevent memory leaks is included.

PR:		252829
Submitted by:	Fabian Keil <fk@fabiankeil.de>
Reported by:	Fabian Keil <fk@fabiankeil.de>
Approved by:	fox (maintainer)
4.6.0
28 Dec 2020 16:44:19
Revision:559504Original commit files touched by this commit This port version is marked as vulnerable.
fox search for other commits by this committer
security/wolfssl: Updates to v4.6.0

Changes since v4.5.0:

wolfSSL Release 4.6.0 (December 22, 2020)

Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

New Build Options

  * wolfSSL now enables linux kernel module support. Big news for Linux kernel
    module developers with crypto requirements! wolfCrypt and wolfSSL are now
    loadable as modules in the Linux kernel, providing the entire libwolfssl
(Only the first 15 lines of the commit message are shown above View all of this commit message)
4.5.0
17 Nov 2020 16:06:06
Revision:555565Original commit files touched by this commit This port version is marked as vulnerable.
pkubaj search for other commits by this committer
security/wolfssl: fix build on big-endian

Merge upstream patch to fix build on big-endian architectures.

Also unmark mips and mips64 as broken, now builds fine.

MFH:		2020Q4 (fix build blanket)
4.5.0
31 Aug 2020 16:01:08
Revision:547195Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
QAT fixes.

Reported by:
http://package21.nyi.freebsd.org/data/113amd64-default-qat/546304/logs/wolfssl-4.5.0.log
4.5.0
22 Aug 2020 01:23:36
Revision:545732Original commit files touched by this commit This port version is marked as vulnerable.
fox search for other commits by this committer
security/wolfssl: Updates to v4.5.0

Changes since v4.4.0:

wolfSSL Release 4.5.0 (August 19, 2020)

If you have questions about this release, feel free to contact us on our
info@ address.

Release 4.5.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

* Added Xilinx Vitis 2019.2 example and README updates
* TLS v1.3 is now enabled by default
(Only the first 15 lines of the commit message are shown above View all of this commit message)
4.4.0
02 May 2020 07:20:49
Revision:533671Original commit files touched by this commit This port version is marked as vulnerable.
fox search for other commits by this committer
security/wolfssl: Fixes build failure.

Uploaded the distfile manually into distcache to prevent failures during fetch.

Reviewed by:	philip
4.4.0
23 Apr 2020 19:18:32
Revision:532705Original commit files touched by this commit This port version is marked as vulnerable.
fox search for other commits by this committer
security/wolfssl: Updates to v4.4.0

Changes since v4.3.0:

wolfSSL Release 4.4.0 (04/22/2020)

If you have questions about this release, feel free to contact us on our
info@ address.

Release 4.4.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions

  * Hexagon support.
  * DSP builds to offload ECC verify operations.
  * Certificate Manager callback support.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
4.3.0
29 Jan 2020 19:17:12
Revision:524597Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Fix PLIST issue (r524152) with DOCS enabled

====> Checking for pkg-plist issues (check-plist)
===> Parsing plist
===> Checking for items in STAGEDIR missing from pkg-plist
===> Checking for items in pkg-plist which are not in STAGEDIR
Error: Missing: %%DOCSDIR%%/README.txt
Error: Missing: %%DOCSDIR%%/example/client.c
Error: Missing: %%DOCSDIR%%/example/echoclient.c
Error: Missing: %%DOCSDIR%%/example/echoserver.c
Error: Missing: %%DOCSDIR%%/example/sctp-client-dtls.c
Error: Missing: %%DOCSDIR%%/example/sctp-client.c
Error: Missing: %%DOCSDIR%%/example/sctp-server-dtls.c
Error: Missing: %%DOCSDIR%%/example/sctp-server.c
Error: Missing: %%DOCSDIR%%/example/server.c
Error: Missing: %%DOCSDIR%%/example/tls_bench.c
Error: Missing: %%DOCSDIR%%/taoCert.txt
===> Error: Plist issues found.
*** Error code 1

Stop.
make: stopped in /usr/ports/security/wolfssl
=>> Error: check-plist failures detected

Approved by:	portmgr (blanket)
4.3.0
26 Jan 2020 05:27:09
Revision:524152Original commit files touched by this commit This port version is marked as vulnerable.
fox search for other commits by this committer
security/wolfssl: Updates to 4.3.0

- Minor portlint / portfmt fixes.
- Take ownership of the port.

Changes:	https://www.wolfssl.com/docs/wolfssl-changelog/
PR:		242853
Submitted by:	takefu@airport.fm
Reviewed by:	philip
4.2.0
13 Dec 2019 12:20:56
Revision:520026Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update to 4.2.0
- Fix LICENSE
- Add LICENSE_FILE
- Add testing support

PR:		233190
Submitted by:	takefu@airport.fm
3.13.0
04 Nov 2019 21:21:04
Revision:516744Original commit files touched by this commit This port version is marked as vulnerable.
rene search for other commits by this committer
Returns johans's ports to the pool after safekeeping his commit bit.
3.13.0
05 Dec 2018 20:01:11
Revision:486720Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
These ports now build on powerpc64.

While here, pet portlint.

Approved by:	portmgr (tier-2 blanket)
3.13.0
17 Nov 2018 17:46:11
Revision:485182Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Update MASTER_SITES and WWW

Approved by:	portmgr (blanket)
3.13.0
10 Sep 2018 13:14:52
Revision:479406Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Add DOCS options to ports that should have one.

Also various fixes related to said option.

PR:		230864
Submitted by:	mat
exp-runs by:	antoine
3.13.0
25 Dec 2017 11:47:18
Revision:457220Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
Update to WolfSSL 3.13.0
https://www.wolfssl.com/docs/wolfssl-changelog/
3.12.2
21 Nov 2017 21:15:35
Revision:454654Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
Update to WolfSSL 3.12
https://www.wolfssl.com/docs/wolfssl-changelog/
3.11.0
02 Jun 2017 15:49:34
Revision:442405Original commit files touched by this commit This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark some ports failing on powerpc64.  These ports are either new
ports, or had been recently unblocked.

While here, pet portlint.

Approved by:	portmgr (tier-2 blanket)
3.11.0
29 May 2017 05:26:57
Revision:441970Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
Correct plist

Reported by:	linimon
3.11.0
09 May 2017 19:05:07
Revision:440511Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
Update to latest release (4 May); bugfixes and new features
https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
3.10.0
27 Dec 2016 10:24:28
Revision:429595Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
Update to WolfSSL 3.10
Configure script now uses bash-isms
3.9.8
12 Sep 2016 20:30:20
Revision:421959Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
Update to WolfSSL 3.9.8
3.9.0
26 Apr 2016 20:58:25
Revision:414076Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
Update to WolfSSL 3.9.0
https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html
3.8.0
06 Jan 2016 21:32:10
Revision:405390Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
- Update WolfSSL to 3.8.0 (new MASTER_SITES, WWW entry and description)
- Includes important security fixes for CVE-2015-7744 and CVE-2015-6925
  see
https://www.wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html
- Disables support for SSLv3

PR:		205936
Submitted by:	Christoph Moench-Tegeder <cmt@burggraben.net>
MFH:		2016Q1
3.4.6
30 Apr 2015 19:41:38
Revision:385058Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
- Update to WolfSSL 3.4.6
- Remove options to include ChaCha and Poly1305, these are now on by default
3.4.0
28 Mar 2015 09:15:25
Revision:382450Original commit files touched by this commit This port version is marked as vulnerable.
johans search for other commits by this committer
CyaSSL has been renamed WolfSSL upstream
Rename port and update to 3.4.0
http://www.yassl.com/yaSSL/Products-wolfssl.html

Number of commits found: 51